| /netbsd-src/crypto/external/bsd/openssl/dist/fuzz/ |
| H A D | README.md | 7 --------- 13 ----------------------------------- 15 Install `clang`, which [ships with `libfuzzer`](http://llvm.org/docs/LibFuzzer.html#fuzzer-usage) 18 sudo apt-get install clang 23 `/usr/lib/llvm-7/lib/clang/7.0.1/lib/linux/libclang_rt.fuzzer-x86_64.a`. 25 CC=clang ./config enable-fuzz-libfuzzer \ 26 --with-fuzzer-lib=$PATH_TO_LIBFUZZER \ 27 -DPEDANTIC enable-asan enable-ubsan no-shared \ 28 -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION \ 29 -fsanitize=fuzzer-no-link \ [all …]
|
| /netbsd-src/crypto/external/bsd/openssl/dist/test/recipes/ |
| H A D | 70-test_sslmessages.t | 2 # Copyright 2015-2021 The OpenSSL Project Authors. All Rights Reserved. 23 if disabled("engine") || disabled("dynamic-engine"); 34 my $proxy = TLSProxy::Proxy->new( 176 $proxy->serverconnects(2); 177 $proxy->clientflags("-no_tls1_3 -sess_out ".$session); 178 $proxy->start() or plan skip_all => "Unable to start up Proxy for tests"; 185 $proxy->clearClient(); 186 $proxy->clientflags("-no_tls1_3 -sess_in ".$session); 187 $proxy->clientstart(); 195 skip "No OCSP support in this OpenSSL build", 3 [all …]
|
| H A D | 80-test_ssl_new.t | 2 # Copyright 2015-2022 The OpenSSL Project Authors. All Rights Reserved. 34 my @conf_srcs = glob(srctop_file("test", "ssl-tests", "*.cnf.in")); 39 # We hard-code the number of tests to double-check that the globbing above 59 my $no_npn = disabled("nextprotoneg"); 68 # expectations dynamically based on the OpenSSL compile-time config. 70 "02-protocol-version.cnf" => !$is_default_tls, 71 "04-client_auth.cnf" => !$is_default_tls || !$is_default_dtls 73 "05-sni.cnf" => disabled("tls1_1"), 74 "07-dtls-protocol-version.cnf" => !$is_default_dtls || !disabled("sctp"), 75 "10-resumption.cnf" => !$is_default_tls || $no_ec, [all …]
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/test/recipes/ |
| H A D | 70-test_sslmessages.t | 2 # Copyright 2015-2019 The OpenSSL Project Authors. All Rights Reserved. 23 if disabled("engine") || disabled("dynamic-engine"); 35 my $proxy = TLSProxy::Proxy->new( 177 $proxy->serverconnects(2); 178 $proxy->clientflags("-no_tls1_3 -sess_out ".$session); 179 $proxy->start() or plan skip_all => "Unable to start up Proxy for tests"; 186 $proxy->clearClient(); 187 $proxy->clientflags("-no_tls1_3 -sess_in ".$session); 188 $proxy->clientstart(); 196 skip "No OCSP support in this OpenSSL build", 3 [all …]
|
| H A D | 80-test_ssl_new.t | 2 # Copyright 2015-2022 The OpenSSL Project Authors. All Rights Reserved. 24 my @conf_srcs = glob(srctop_file("test", "ssl-tests", "*.conf.in")); 29 # We hard-code the number of tests to double-check that the globbing above 46 my $no_npn = disabled("nextprotoneg"); 55 # expectations dynamically based on the OpenSSL compile-time config. 57 "02-protocol-version.conf" => !$is_default_tls, 58 "04-client_auth.conf" => !$is_default_tls || !$is_default_dtls 60 "05-sni.conf" => disabled("tls1_1"), 61 "07-dtls-protocol-version.conf" => !$is_default_dtls || !disabled("sctp"), 62 "10-resumption.conf" => !$is_default_tls, [all …]
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/fuzz/ |
| H A D | README.md | 12 $ sudo apt-get install git 13 $ mkdir git-work 17 You may want to git pull and re-run the update from time to time. 21 $ PATH=~/third_party/llvm-build/Release+Asserts/bin/:$PATH 24 https://github.com/llvm-mirror/llvm/tree/master/lib/Fuzzer if you prefer): 27 $ sudo apt-get install subversion 28 $ mkdir svn-work 29 $ cd svn-work 30 $ svn co https://llvm.org/svn/llvm-project/compiler-rt/trunk/lib/fuzzer Fuzzer 32 $ clang++ -c -g -O2 -std=c++11 *.cpp [all …]
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/ |
| H A D | appveyor.yml | 2 - Visual Studio 2017 5 - x64 6 - x86 11 - VSVER: 15 14 - shared 15 - plain 16 - minimal 19 - ps: >- 20 Install-Module VSSetup -Scope CurrentUser 21 - ps: >- [all …]
|
| H A D | INSTALL | 2 -------------------- 28 --------------------------------------- 46 - or - 48 - or - 76 ----------- 96 $ perl Configure { VC-WIN32 | VC-WIN64A | VC-WIN64I | VC-CE } 114 engines. If you already have a pre-installed version of OpenSSL as part of 119 --prefix and --openssldir are explained further down, and the values shown 124 $ ./config --prefix=/opt/openssl --openssldir=/usr/local/ssl 128 $ @config --prefix=PROGRAM:[INSTALLS] --openssldir=SYS$MANAGER:[OPENSSL] [all …]
|
| H A D | Configure | 2 # -*- mode: perl; -*- 3 # Copyright 2016-2023 The OpenSSL Project Authors. All Rights Reserved. 10 ## Configure -- OpenSSL source tree configuration script 27 …no-<cipher> ...] [enable-<cipher> ...] [-Dxxx] [-lxxx] [-Lxxx] [-fxxx] [-Kxxx] [no-hw-xxx|no-hw] [… 31 # --config add the given configuration file, which will be read after 34 # --prefix prefix for the OpenSSL installation, which includes the 38 # --openssldir OpenSSL data area, such as openssl.cnf, certificates and keys. 40 # given with --prefix. 44 # --cross-compile-prefix Add specified prefix to binutils components. 46 # --api One of 0.9.8, 1.0.0 or 1.1.0. Do not compile support for [all …]
|
| H A D | CHANGES | 5 This is a high-level summary of the most important changes. 21 David Benjamin for discovering this issue. (CVE-2023-0286) 28 no ABI change. 31 *) Fixed Use-after-free following BIO_new_NDEF. 46 then a use-after-free will occur. This will most likely result in a crash. 47 (CVE-2023-0215) 71 (CVE-2022-4450) 81 modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. 82 (CVE-2022-4304) 93 *) Fixed the linux-mips64 Configure target which was missing the [all …]
|
| /netbsd-src/crypto/external/bsd/openssl.old/lib/libcrypto/man/ |
| H A D | openssl_s_server.1 | 20 .\" Set up some character translations and predefined strings. \*(-- will 26 .tr \(*W- 29 . ds -- \(*W- 31 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 32 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 39 . ds -- \|\(em\| 75 .\" Fear. Run. Save yourself. No user-serviceable parts. 85 . ds #H ((1u-(\\\\n(.fu%2u))*.13m) 101 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 102 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' [all …]
|
| H A D | openssl_s_client.1 | 20 .\" Set up some character translations and predefined strings. \*(-- will 26 .tr \(*W- 29 . ds -- \(*W- 31 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 32 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 39 . ds -- \|\(em\| 75 .\" Fear. Run. Save yourself. No user-serviceable parts. 85 . ds #H ((1u-(\\\\n(.fu%2u))*.13m) 101 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 102 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' [all …]
|
| /netbsd-src/crypto/external/bsd/openssl/lib/libcrypto/man/ |
| H A D | openssl-s_server.1 | 1 .\" $NetBSD: openssl-s_server.1,v 1.1 2024/07/12 21:01:08 christos Exp $ 3 .\" -*- mode: troff; coding: utf-8 -*- 59 .IX Title "OPENSSL-S_SERVER 1" 60 .TH OPENSSL-S_SERVER 1 2024-07-11 3.0.14 OpenSSL 66 openssl\-s_server \- SSL/TLS server program 70 [\fB\-help\fR] 71 [\fB\-port\fR \fI+int\fR] 72 [\fB\-accept\fR \fIval\fR] 73 [\fB\-unix\fR \fIval\fR] 74 [\fB\-4\fR] [all …]
|
| H A D | openssl-s_client.1 | 1 .\" $NetBSD: openssl-s_client.1,v 1.1 2024/07/12 21:01:08 christos Exp $ 3 .\" -*- mode: troff; coding: utf-8 -*- 59 .IX Title "OPENSSL-S_CLIENT 1" 60 .TH OPENSSL-S_CLIENT 1 2024-07-11 3.0.14 OpenSSL 66 openssl\-s_client \- SSL/TLS client program 70 [\fB\-help\fR] 71 [\fB\-ssl_config\fR \fIsection\fR] 72 [\fB\-connect\fR \fIhost:port\fR] 73 [\fB\-host\fR \fIhostname\fR] 74 [\fB\-port\fR \fIport\fR] [all …]
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man1/ |
| H A D | s_server.pod | 5 openssl-s_server, 6 s_server - SSL/TLS server program 11 [B<-help>] 12 [B<-port +int>] 13 [B<-accept val>] 14 [B<-unix val>] 15 [B<-4>] 16 [B<-6>] 17 [B<-unlink>] 18 [B<-context val>] [all …]
|
| H A D | s_client.pod | 5 openssl-s_client, 6 s_client - SSL/TLS client program 11 [B<-help>] 12 [B<-connect host:port>] 13 [B<-bind host:port>] 14 [B<-proxy host:port>] 15 [B<-unix path>] 16 [B<-4>] 17 [B<-6>] 18 [B<-servername name>] [all …]
|
| /netbsd-src/crypto/external/bsd/openssl/dist/apps/ |
| H A D | s_client.c | 2 * Copyright 1995-2023 The OpenSSL Project Authors. All Rights Reserved. 108 /* no ServerKeyExchange message */ in psk_client_cb() 178 /* We default to SHA-256 */ in psk_use_session_cb() 230 if (SSL_get_servername_type(s) != -1) in ssl_servername_cb() 231 p->ack = !SSL_session_reused(s) && hn != NULL; in ssl_servername_cb() 267 ctx->status = in next_proto_cb() 268 SSL_select_next_proto(out, outlen, in, inlen, ctx->data, ctx->len); in next_proto_cb() 308 return -1; in hexdecode() 334 return cp - (*out = ret); in hexdecode() 356 return -1; in checked_uint8() [all …]
|
| H A D | s_server.c | 2 * Copyright 1995-2024 The OpenSSL Project Authors. All Rights Reserved. 73 static int accept_socket = -1; 109 * We define this but make it always be 0 in no-dtls builds to simplify the 137 * possible to use a single callback for all protocol versions - but it in psk_server_cb() 289 wbuf->alloced = 1024; in ebcdic_new() 290 wbuf->buff[0] = '\0'; in ebcdic_new() 341 if (inl > (num = wbuf->alloced)) { in ebcdic_write() 348 wbuf->alloced = num; in ebcdic_write() 349 wbuf->buff[0] = '\0'; in ebcdic_write() 354 ebcdic2ascii(wbuf->buff, in, inl); in ebcdic_write() [all …]
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/apps/ |
| H A D | s_client.c | 2 * Copyright 1995-2021 The OpenSSL Project Authors. All Rights Reserved. 131 /* no ServerKeyExchange message */ in psk_client_cb() 201 /* We default to SHA-256 */ in psk_use_session_cb() 253 if (SSL_get_servername_type(s) != -1) in ssl_servername_cb() 254 p->ack = !SSL_session_reused(s) && hn != NULL; in ssl_servername_cb() 284 /* p = (N-1)/2 */ in srp_Verify_N_and_g() 287 /* verify g^((N-1)/2) == -1 (mod N) */ in srp_Verify_N_and_g() 297 /*- 299 * - extended debugging 300 * - making some primality tests for unknown groups [all …]
|
| H A D | s_server.c | 2 * Copyright 1995-2022 The OpenSSL Project Authors. All Rights Reserved. 80 static int accept_socket = -1; 114 * We define this but make it always be 0 in no-dtls builds to simplify the 140 * possible to use a single callback for all protocol versions - but it in psk_server_cb() 265 if (p->login == NULL && p->user == NULL) { in ssl_srp_server_param_cb() 266 p->login = SSL_get_srp_username(s); in ssl_srp_server_param_cb() 267 BIO_printf(bio_err, "SRP username = \"%s\"\n", p->login); in ssl_srp_server_param_cb() 268 return -1; in ssl_srp_server_param_cb() 271 if (p->user == NULL) { in ssl_srp_server_param_cb() 272 BIO_printf(bio_err, "User %s doesn't exist\n", p->login); in ssl_srp_server_param_cb() [all …]
|